DigiTrack - Attacks for $5 or less using Arduino
DigiTrack - In 30 seconds, this attack can learn which networks a MacOS computer has connected to before, and plant a script that tracks the current IP address and Wi-Fi network every 60 seconds. Now...
View Articler00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability
r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be used for law violations or personal gain. The author of...
View ArticleHow to Prevent and Detect APT Attacks by Gilad David Maayan
An advanced persistent threat (APT) is a cyberattack that is executed by an organized group of skilled actors. These attacks are carefully planned and conducted against strategic targets and extend...
View ArticleJackdaw - Tool To Collect All Information In Your Domain
Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each other and how a potential attacker may...
View Articlednsteal - DNS Exfiltration tool for stealthily sending files over DNS requests
This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below are a couple of different images showing examples of multiple file transfer and...
View ArticleFrida API Fuzzer - experimental fuzzer meant to be used for API in-memory...
This experimental fuzzer is meant to be used for API in-memory fuzzing. The design is highly inspired and based on AFL/AFL++. ATM the mutator is quite simple, just the AFL's havoc and splice stages. I...
View ArticlePastebinScrapy - Flask application for scraping latest scrapes from Pastebin
This is a Web Scraping application built on Flask. This web application utilizes Pastebin Scraping API and scrapes IOCs including IP addresses, domains, hashes, and emails from the latest pastes of...
View ArticleLogonSessions for Incident Response [FREE COURSE CONTENT]
In this tutorial from our Security Incident Response course you will see how to use the LogonSessions tool from Windows Sysinternals in incident response. Want to add something to your toolbox? Let's...
View ArticleProject iKy - Tool That Collects Information From An Email
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Installation Clone repository git clone https://gitlab.com/kennbroorg/iKy.git Install Backend...
View ArticleChromepass - Hacking Chrome Saved Passwords
Chromepass is a python-based console application that generates Windows executable with the following features: Decrypt Chrome saved passwords Send a file with the login/password combinations remotely...
View ArticleTentacle - A POC Vulnerability Verification And Exploit Framework
Tentacle is a POC vulnerability verification and exploits framework. It supports the free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan, and other APIs to...
View ArticleInstashell - Multi-threaded Instagram Brute Forcer without password limit
Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram, this script can bypass login limiting and it can test infinite number of passwords with a rate of +400...
View ArticlePrint-My-Shell: Python script wrote to automate the process of generating...
"Print My Shell" is a python script, wrote to automate the process of generating various reverse shells based on PayloadsAllTheThings and Pentestmonkey reverse shell cheat sheets. Using this script you...
View ArticleUTM - a full featured virtual machine host for iOS.
UTM is a full-featured virtual machine host for iOS. In short, it allows you to run Windows, Android, and more on your iPhone and iPad. More information at https://getutm.app/ Features 30+ processors...
View ArticleInhale - A malware analysis and classification tool.
Inhale is a malware analysis and classification tool that is capable of automating and scaling many static analysis operations. This is the beta release version, for testing purposes, feedback, and...
View ArticleCybersecurity In The Time Of Coronavirus by Jessica Bennett
When the year began, none of us imagined that in just under three months our lives would change so drastically. Due to the Coronavirus pandemic, life as we knew it has changed entirely. And it is...
View ArticleInjectify - Perform advanced MiTM attacks on websites with ease.
Injectify is a web based MiTM tool, similiar to BeEF (although completely unrelated in terms of source code). It uses modern web technologies such as ReactJS, Redux, Typescript and Webpack. What can it...
View ArticleXploitSPY is an Android Monitoring / Spying Tool
A cloud based Android Spying or Monitoring Tool, powered by NodeJS NOTE: Read all steps carefully to setup XploitSPY as we keep changing them as per need Features GPS Logging Microphone Recording View...
View ArticleTop 7 Cloud Security Issues and How to Overcome Them by Gilad David Maayan
Cloud computing transforms the way companies store and shares data, workloads, and applications. However, cloud environments also introduce a lot of new security threats and challenges, which often...
View ArticleTechNowLogger - Windows/Linux Keylogger Generator which sends key-logs via...
TechNowLogger is Keylogger Generator for Windows/Linux, which sends key-logs & screenshot via email with other juicy target info written in Python 3. Disclaimer This project was created only for...
View Article